hacking

  1. Hacker

    Hacking from scratch - where to start

    Many people believe that a hacker is a computer hacker, but this is a misconception. That's why, before you learn this profession, I recommend that you understand what a hacker is. For some people, work is a way of life. This kind of makings are most often laid down in childhood. This is...
  2. Hacker

    Hacking. Stage "DEADLOCK"

    Hello to everyone, dear friends! Read one of the applications from a person who wants to enroll in hacking academy. Quote: Unfortunately, this is a practical standard answer to the question we ask those who want to get into training. We hope that you yourself have already seen what the...
  3. Hacker

    COLLECTION OF HACKING PENTESTER TOOLS 2021

    ╦ ╦╔═╗ ╔═╗ ╦╔═ ╠═╣╠═╣ ║ ╠╩╗ ╩ ╩╩ ╩ ╚═╝ ╩ ╩ '╔╦╗╔═╗╔═╗╦ ╔═╗ ║ ║ ║║ '║║ ╚═╗ ╩ ╚═╝╚═╝╩═╝╚═╝ Anti Forensics Tools AudioStego - Audio file steganography. Hides files or text inside audio files and retrieve them automatically...
  4. Hacker

    Legal hacking

    There are 3 types of hackers. The former put a higher goal in their actions, hacking the websites of government organizations. The latter find gaps in financial and user systems, wanting to get rich quickly. Still others engage in hacking out of interest, challenging themselves and others. From...
  5. Hacker

    Best Hacking Tools in 2021

    1. Metasploit Metasploit is more than just a collection of tools for creating exploits, I would call Metasploit an infrastructure that you can use to create your own tools. This package of hacking tools for 2017 will give you the opportunity to simulate real hacker attacks to identify...
  6. Hacker

    A very large selection of hacker software

    Hacker Tools: A list of security tools for testing and demonstrating weaknesses in protecting applications and networks, these tools are designed for information security professionals. Sniffing Wireshark Wireshark is used by network professionals around the world for problem solving...
  7. Lord777

    The best platforms for learning how to hack

    Content 1. Platforms for training and practice of hacking 1.1 Hack The Box 1.2 Root Me 1.3 VulnHub 2. Tips for beginners In this article, we will find out which sites allow you to study and hone your hacking skills and are valued by security experts. They allow white hackers to be ethical...
  8. BadB

    Hacking ICLOUD on iPhone, iPad!

    The method is suitable for absolutely any iOS device (absolutely any version). - What is the essence of the blocking bypass method? - The method consists in spoofing the Apple iCloud DNS addresses. STEP 1 We choose absolutely any, there is no difference. STEP 2 If Wi-Fi is already connected...
  9. dunkelh3it

    Kali Linux – Password Cracking Tool

    Password cracking is a mechanism that is used in most of the parts of hacking. Exploitation uses it to exploit the applications by cracking their administrator or other account passwords, Information Gathering uses it when we have to get the social media or other accounts of the C.E.O. or other...
  10. BadB

    Hacking with theft over Wi-Fi

    Background. An average city, let's call it N, was hosting a crypto conference. Let's call the location "MyTarget". So, there were several Wi-Fi access points, vulnerable access points, which was simply a sin not to use. Armed with a laptop with Linux on board, a Wi-Fi adapter (for range), I went...
  11. BadB

    Mass hacking of telegram accounts

    Hi young hacker, this article will focus on hacking telegram accounts. In addition to the official clients, the telegram.me domain is actively used. It serves as a link to a contact, an invite link to add to a group or channel, you can also add stickers through it. If the user is authenticated...
  12. dunkelh3it

    Top Kali Linux Tools for Hacking and Penetration Testing

    Top Kali Linux Tools for Hacking and Penetration Testing Kali Linux There are several types of tools that comes pre-installed. If you do not find a tool installed, simply download it and set it up. It’s easy. 1. Nmap Kali Linux Nmap Nmap or “Network Mapper” is one of the most popular tools...
  13. BadB

    Hacking mobile communications via SS7: intercepting SMS, tracking, etc.

    The content of the article A bit of theory Attack options Determining the location of the subscriber Subscriber Availability Disruption (DoS) Interception of SMS Summing up Today, probably, there is no person who does not use mobile communications. And mobile communications are no longer...
  14. BadB

    Mobile hacking without root rights

    Today we will talk about how to turn your modest (or not so modest) smartphone into a real hacker device, without having root rights. Let's get started. 1. Fing This application, like all others, was created for peaceful purposes, namely, it was created to monitor small Wi-Fi networks. Here we...
  15. BadB

    Hacking Wi-Fi

    How does Wi-Fi work? Introduction It was back in 1998, and in a cozy radio lab in Australia, an experienced engineer John O'sullivan created a technology that, no less, changed the world. How it works Let's start, perhaps, with simple things. From the previous material about how the Internet...
  16. T

    How to hack phone with sim card?

    hello brothers, my friend got hacked , they stoped his sim card, and changed all his info including his binance account(10k) they took everything,. How could someone hack a sim card ?
  17. Carding

    Hacking Android image key

    This paper shows how to solve the graphic key of the user of an Android device. This method is supposed to work only on phones with root permissions. The article is based on a problem that was solved during the online CTF (Capture the Flag, computer security competition). Currently, almost all...
  18. Carding 4 Carders

    Hacking IOS

    Hello everybody! Straight to the point. First, we need to learn how AirDrop works: The first stage of airdrop transmission is sending out a BLE package To initiate data transfer via AirDrop, the initiator's phone sends a broadcast BLE packet containing hashed information about the iCloud...
  19. Carding 4 Carders

    10 best hacking gadgets to crack

    The tools listed below are perfect for any novice hacker. 1) Raspberry Pi 4 8 GB Extreme Kit-128 GB version (8 GB RAM) The Raspberry Pi is a computer the size of a credit card that will easily fit in your pocket. The Raspberry Pi is one of the best devices a hacker should have. You can use...
  20. Carding 4 Carders

    Creating malicious QR codes for hacking phones and other devices

    Installing QRGen First, we need to download the repository from github. git clone https://github.com/h0nus/QRGen.git After downloading, change the directory using cd. cd /QRGen Let's see the file README.md. Now we need to install some requirements and libraries that are required for...
Top